Communication-Efficient Secure Computation of Encrypted Inputs Using (k, n) Threshold Secret Sharing

被引:5
|
作者
Iwamura, Keiichi [1 ]
Kamal, Ahmad Akmal Aminuddin Mohd [2 ]
机构
[1] Tokyo Univ Sci, Dept Elect Engn, Tokyo 1258585, Japan
[2] Tokyo Univ Sci, Dept Informat & Comp Technol, Tokyo 1258585, Japan
关键词
Cloud computing security; data preprocessing; data privacy; high-speed computation; information security; multi-party computation; secure computation; threshold secret sharing; secure storage; FULLY HOMOMORPHIC ENCRYPTION; MULTIPARTY COMPUTATION; KEY;
D O I
10.1109/ACCESS.2023.3278995
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advancements in Internet of Things devices allow for the collection and analysis of big data. Moreover, cloud computing has emerged as an ideal platform for big data analysis because it quickly provides computing resources for analysis at scale. However, concerns exist regarding the privacy and security of this information. Secure computation is a technology that enables computation while maintaining data encryption. In this study, we present a new secure computation based on a client-server model, in which a set of servers perform computations using the inputs of multiple clients. We adopt the (k, n) threshold secret sharing approach, where an input s is divided into n shares and can be recovered from shares with a threshold k. However, conventional secure computation using (k, n) threshold secret sharing generally requires the condition n = 2k - 1 and communication among multiple servers for each multiplication. To the best of our knowledge, no previous study has solved this problem completely. We demonstrate that processes that require communication can be concentrated in the preprocessing phase and propose a secure computation using (k, n) threshold secret sharing that does not require communication during the secure computation phase, even when multiplication is performed. Moreover, we show that the number of communications does not depend on the number of multiplications, unlike in conventional methods. As communication often requires more processing time than the actual secure computation, our method makes it possible to realize faster overall processing than conventional methods. We also present an extensive security analysis and experimental simulation of the proposed method. Our proposed method achieves information-theoretic security against semi-honest adversaries under certain conditions with n < 2k - 1.
引用
收藏
页码:51166 / 51184
页数:19
相关论文
共 50 条
  • [31] An efficient (t,n)–threshold secret image sharing scheme
    Ali Kanso
    Mohammad Ghebleh
    Multimedia Tools and Applications, 2017, 76 : 16369 - 16388
  • [32] rPIR: ramp secret sharing-based communication-efficient private information retrieval
    Lichun Li
    Michael Militzer
    Anwitaman Datta
    International Journal of Information Security, 2017, 16 : 603 - 625
  • [33] Standard (k, n)-threshold hierarchical quantum secret sharing
    Li, Fulin
    Wu, Qingao
    Lin, Changlu
    Zhu, Shixin
    QUANTUM INFORMATION PROCESSING, 2024, 23 (05)
  • [34] Verifiable Quantum (k,n)-threshold Secret Key Sharing
    Yu-Guang Yang
    Yi-Wei Teng
    Hai-Ping Chai
    Qiao-Yan Wen
    International Journal of Theoretical Physics, 2011, 50 : 792 - 798
  • [35] Verifiable Quantum (k,n)-threshold Secret Key Sharing
    Yang, Yu-Guang
    Teng, Yi-Wei
    Chai, Hai-Ping
    Wen, Qiao-Yan
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2011, 50 (03) : 792 - 798
  • [36] Efficient (k, n)-threshold secret sharing method with cheater prevention for QR code application
    Huang, Peng-Cheng
    Chang, Ching-Chun
    Li, Yung-Hui
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (01): : 155 - 163
  • [37] Encrypted Classification Using Secure K-Nearest Neighbour Computation
    Reddy, B. Praeep Kumar
    Chatterjee, Ayantika
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019, 2019, 11947 : 176 - 194
  • [38] Dynamic (2,3) Threshold Quantum Secret Sharing of Secure Direct Communication
    Lai Hong
    Mehmet, Orgun A.
    Xiao Jing-Hua
    Josef, Pieprzyk
    Xue Li-Yin
    COMMUNICATIONS IN THEORETICAL PHYSICS, 2015, 63 (04) : 459 - 465
  • [39] n-Bit Quantum Secret Sharing Protocol Using Quantum Secure Direct Communication
    Mohammad Sadegh Sadeghi-Zadeh
    Mahsa Khorrampanah
    Monireh Houshmand
    Hossein Aghababa
    Yousef Mafi
    International Journal of Theoretical Physics, 2021, 60 : 3744 - 3759
  • [40] n-Bit Quantum Secret Sharing Protocol Using Quantum Secure Direct Communication
    Sadeghi-Zadeh, Mohammad Sadegh
    Khorrampanah, Mahsa
    Houshmand, Monireh
    Aghababa, Hossein
    Mafi, Yousef
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (10) : 3744 - 3759